Computer and Network Security: Addressing Privacy Conce s
Legacy signals
Legacy popularity: 1,097 legacy views
Computer and network security have become increasingly important across all industries. From protecting corporate networks from malware, hackers, and denial of service attacks to securing government networks from cyber espionage and cyber terrorism, modern network administrators and Windows Server security specialists are tasked with an important, ever-evolving challenge. In addition to securing computers, servers, and networks from threats in order to protect data and as a matter of national security, computer and network security must also protect the privacy of employees, customers, legal clients, patients, and others whose personal information is stored within an entity's servers.
For example, health plans, health plan clearinghouses, healthcare providers, business associates, and other covered entities must comply with the Health Insurance Portability and Accountability Act's (HIPAA's) Security Rule and Privacy Rule. These rules are in place to protect patients' "protected health information" (PHI) which is defined as "individually identifiable health information." When a covered entity transmits PHI electronically (such as via fax, email, or file upload), it must do so in compliance with HIPAA. Though the HIPAA Security Rule doesn't necessarily specify which Windows Server security product should be used, it does provide national standards to protect PHI and requires appropriate safeguards to ensure that the security, integrity, and confidentiality of PHI is protected.
Computer and network security is also a conce
for financial institutions, retailers, and even law firms. Obviously, banks should have strong safeguards in place to ensure that only authorized account holders have access to bank accounts; however, privacy is also expected by consumers who place their assets and their trust in these institutions.
Retailers have an obligation to safeguard credit card transactions both at the point of sale as well as long after. For example, there have been numerous security breaches where hackers have infiltrated commercial databases and accessed hundreds of thousands of stored customer records. These records can contain everything from name, phone number, and address to login credentials, credit card numbers, and Social Security numbers.
Law firms have an obligation to protect the confidentiality and privacy of their clients, making computer and network security a must in any law firm. Those handling high profile cases or representing celebrity clients could even be at risk for targeting by hackers.
Computer and network security is an industry in its own right with information security professionals who specialize in securing computers and networks of all sizes. The size of the network, the organization type, the nature of data stored, level of risk, and applicable regulations influence the Windows Server security approach. In general, any computer that accesses an exte
al source should be secured against threats such as computer viruses, malware, and intrusions. The complexity of computer and network security increases with the complexity of the organization.
In addition to basic computer and network security solutions such as Windows Server security software, firewalls, and intrusion detection systems, security awareness training is a must as is a comprehensive mobile device security policy. A single inadvertent click on a phishing email or a lost laptop can make even the most secure system vulnerable and confidential data could be severely compromised.
Computer and network security and privacy go hand-in-hand. Patch the holes in your security system and protect your own confidential data as well as the private information your customers and patients have entrusted you with.
Article author
About the Author
Further reading
Further Reading
Article
Self Mastery As A Way Of Life
Old habits die hard, as the saying goes. And one habit that most of us share—and find difficult to both notice and shake—is our tendency to run “on automatic.” Unconscious patterns of thinking, feeling, and behaving are often the silent saboteurs of self mastery in our ...
Related piece
Article
Benefits of a transition plan when selling your business
For most owners of a privately held company, when the time is right they want to sell their business for the highest price possible in the quickest time possible and live happily ever after. There is nothing too complicated in that and at a basic level, that’s perfectly fine. However, a question to ask is whether the business owner wants to sell the business or is their preference to transition the business?
Related piece
Article
How a business transition plan enhances selling your business
A transition plan that allows the business owner to sell the business for the highest price possible in the shortest amount of time to the most qualified buyer is generally the top of the wish list for most business owners. Because the business owner lives and breathes their business they become emotionally attached to their customers, employees, suppliers and other business partners as the business is a reflection of who they are.
Related piece
Article
Importance Of Terms When Buying Or Selling A Business
In the initial stages of listing a business for sale, all the attention is placed on getting the business in shape so it presents as strongly as possible, sometimes doing a business valuation to arrive at the most appropriate listing price for the business and discussing the tax implications to the seller of the business. Tom West is the owner of Business Brokerage Press and he has a great saying that most sellers and buyers don’t understand until they get into the negotiations of the transaction and it is – You name the price and I’ll name the terms.
Related piece